US8085730B2 - Method, system and apparatus for backuping HA/MAP in mobile IPV6 network - Google Patents
Method, system and apparatus for backuping HA/MAP in mobile IPV6 network Download PDFInfo
- Publication number
- US8085730B2 US8085730B2 US12/060,365 US6036508A US8085730B2 US 8085730 B2 US8085730 B2 US 8085730B2 US 6036508 A US6036508 A US 6036508A US 8085730 B2 US8085730 B2 US 8085730B2
- Authority
- US
- United States
- Prior art keywords
- map
- active
- standby
- backup
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000009448 modified atmosphere packaging Methods 0.000 claims abstract description 380
- 230000011664 signaling Effects 0.000 claims abstract description 49
- 235000019837 monoammonium phosphate Nutrition 0.000 claims abstract description 9
- 230000003993 interaction Effects 0.000 claims description 28
- 230000004044 response Effects 0.000 claims description 22
- 238000012545 processing Methods 0.000 claims description 21
- 230000007704 transition Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 230000000717 retained effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/12—Mobility data transfer between location registers or mobility servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/30—Network data restoration; Network data reliability; Network data fault tolerance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
Definitions
- the disclosure relates to the communication field, and more particularly, to a method for backuping the home agent or mobile anchor point (HA/MAP) in the mobile IIPv6 network.
- HA/MAP home agent or mobile anchor point
- a mobile node may perform the IP communication by using the initial IP address all the time in the movement. Therefore, an upper layer application carried in the IP network layer may be ensured uninterrupted and continuable.
- the operation principle of the Mobile IP is that when an MN is connected to its home network, the MN works in the same manner as other fixed nodes. If the MN finds itself moved to a foreign network, the care of address (CoA) on the foreign network is obtained by the stateful or stateless auto-configuration based on the received information announced by the router. Here, the MN owns the home address and the CoA at the same time. The MN registers its CoA to the home agent (HA) by a ‘binding update’ message. If the correspondence node (CN) of the MN does not know the CoA of the MN, the correspondence node sends the data packets to the home network of the MN according to the home address of the MN.
- the correspondence node (CN) of the MN does not know the CoA of the MN, the correspondence node sends the data packets to the home network of the MN according to the home address of the MN.
- the HA of the MN captures these data packets and transfers these data packets to the MN by using a tunnel mechanism according to the current CoA of the MN.
- the message sent by the MN to the CN is sent to the HA via a reverse tunnel, and is transferred to the CN by the HA.
- the manner may be called ‘triangle route’ manner.
- a plurality of HAs may be set on the home link.
- the switching process of the HA and the MN is as follows.
- the MN detects the invalidation of the HA. Specifically, if the MN may not obtain the prefix of the home address from the HA or the MN may not complete the home registration with the HA, the MN detects the invalidation of the HA. In addition, if the MN fails to communicate with the outer CN via the HA, the MN may detect the invalidation of the HA.
- the MN sends an HA address request to obtain a redundant HA address when the MN detects the invalidation of the HA. After obtaining the HA address by the MN, the MN sends a home link prefix request to get its own home address. Subsequently, the MN completes the home registration. The MN re-completes the process of the registration and communication with other CNs.
- the HA on the same home link completes the election between the active HA/MAP and the standby HA/MAP by the virtual route redundancy protocol (VRRP).
- VRRP virtual route redundancy protocol
- the active HA/MAP When the active HA/MAP performs message interaction with the MN, the active HA/MAP creates a binding request and a binding update message by expanding the VRRP message to complete the backup of the binding database record from the active HA/MAP to the standby MA/MAP.
- the service flow (the triangle route) which is performing communication currently is not impacted and the standby HA/MAP may continually transfer the service between the MN and the CN.
- the method creates the binding request and the binding update message by the manner of expanding the VRRP message to complete the backup of the binding database record from the active HA/MAP to the standby HA/MAP.
- the quality of the communication between the MN and the CN may not be ensured because the backup is not performed in real time.
- the MN needs to re-perform the key interaction with the new HA because the key negotiated before may not be retained. The process of the binding update of the MN is delayed.
- the disclosure provides a method, system and apparatus for backuping an HA/MAP in a mobile IPv6 network to realize the real-time backup of the HA/MAP and enable a standby HA/MAP to take over seamlessly when an active HA/MAP is invalid.
- a method for backuping a home agent or mobile anchor protocol (HA/MAP) in a mobile IPv6 network, at least two HAs/MAPs forming a redundant backup group includes following steps.
- the at least two HAs/MAPs elect an active HA/MAP and a standby HA/MAP.
- the standby HA/MAP obtains in real time a signaling message sent by the MN to the active HA/MAP and the signaling message sent by the active HA/MAP to the MN; or after performing the signaling message interaction with the MN, the active HA/MAP sends status information in real time to the standby HA/MAP via a synchronization message.
- the standby HA/MAP elects a new active HA/MAP when the active HA/MAP is invalid.
- the step of obtaining in real time, by the standby HA/MAP, the signaling message sent by the MN to the active HA/MAP and a signaling message sent by the active HA/MAP to the MN specifically includes following steps.
- a backup information channel is established among the standby HA/MAP, the active HA/MAP and the MN.
- the standby HA/MAP obtains in real time the signaling message between the active HA/MAP and the MN via the backup information channel.
- the signaling message includes a binding update message and a key exchange message of a security association.
- the step of establishing the backup information channel is: forming the backup information channel by connecting the active HA/MAP, the standby HA/MAP and the MN to an outer switch located outside each outer link interface.
- the step of obtaining in real time, by the standby HA/MAP, the signaling message between the active HA/MAP and the MN via the backup information channel specifically is that the outer switch copies the message sent by the MN to the active HA/MAP and the message sent by the active HA/MAP to the MN to the standby HA/MAP.
- the method further includes: processing the signaling message obtained in real time.
- the step of processing the signaling message obtained in real time specifically includes following steps.
- a new record is established in a backup database and marked as temporarily unusable after the standby HA/MAP has obtained a binding update request sent by the MN.
- the record is marked as usable or updated according to an obtained binding update acknowledgement message sent by the active HA/MAP.
- the active HA/MAP repeatedly performs an address examination for the binding update message; if the home address of the MN is different from the home address of other MNs and an address of a local link node, the binding update acknowledgement message is the binding update acknowledgement message sent by the active HA/MAP directly to the MN.
- the binding update acknowledgement message is the binding update acknowledgement message including a suggested home address sent by the active HA/MAP to the MN.
- the binding update acknowledgement message is the binding update acknowledgement message including the home address initiatively allocated for the MN and sent by the active HA/MAP to the MN.
- the step of marking the record as usable or updating the record according to an obtained binding update acknowledgement message sent by the active HA/MAP specifically includes following steps.
- the standby HA/MAP marks the new record as usable in the database.
- the standby HA/MAP adds the allocated home address into the new record in the database.
- the standby HA/MAP updates the new record as the suggested home address in the database.
- the step of processing the signaling message obtained in real time specifically includes that the standby HA/MAP keeps real-time synchronization with a sending serial number and a receiving slip window of the active HA/MAP by analyzing the obtained signaling message between the active HA/MAP and the MN.
- the method further includes following steps.
- a current HA/MAP sends batch backup information to the HA/MAP
- the HA/MAP enters a real-time backup status after completing a batch backup.
- the step of sending, by a current HA/MAP, batch backup information to the HA/MAP specifically includes following steps.
- a current active HA/MAP sends a backup response carrying a security policy database, a security association database, Internet key exchange status information and binding updated index information which are needed by the HA/MAP;
- the current active HA/MAP sends a backup response carrying the current security policy database, the security association database, the Internet key exchange status information and the binding updated index information to the HA/MAP.
- a downloaded security policy database, the security association database, the Internet key exchange status information and the binding updated index information are determined after receiving the backup response of the current active HA/MAP by the HA/MAP; the batch backup request is resent to the current HA/MAP; backup information is downloaded and sent to the standby HA/MAP according to a re-received request by the current HA/MAP.
- the step of sending status information in real time to the standby HA/MAP via a synchronization message includes that the active HA/MAP synchronizes a key exchange status to the standby HA/MAP via the synchronization message when the active HA/MAP dynamically creates the security association with the MN.
- the step of synchronizing, by the active HA/MAP, a key exchange status to the standby HA/MAP via the synchronization message specifically includes following steps.
- the active HA/MAP synchronizes a first phase status of the Internet key exchange to the standby HA/MAP.
- the active HA/MAP synchronizes a second phase status or the second phase and the first phase status of the Internet key exchange to the standby HA/MAP.
- the step of sending status information in real time to the standby HA/MAP via a synchronization message includes that the active HA/MAP backups binding cache information to the standby HA/MAP via the synchronization message.
- a system for backuping a home agent or mobile anchor protocol (HA/MAP) in a mobile IPv6 network includes a redundant backup group formed by at least two HAs/MAPs and the at least HAs/MAPs includes an elected active HA/MAP and a standby HA/MAP; the standby HA/MAP is adapted to obtain in real time a signaling message sent by the active HA/MAP to a mobile node (MN) and the signaling message sent by the MN to the active HA/MAP or is adapted to obtain status information in real time sent by the active HA/MAP via a synchronization message.
- MN mobile node
- system further includes:
- a backup information channel established among the standby HA/MAP, the active HA/MAP and the MN and adapted to transmit a message obtained in real time by the standby HA/MAP;
- an outer switch located outside each outer link interface, connected to the active HA/MAP, the standby HA/MAP and the MN, and adapted to copy the message sent by the active HA/MAP to the MN and the message sent by the MN to the active HA/MAP to the standby HA/MAP.
- An apparatus for backuping a home agent or mobile anchor point (HA/MAP) in an IPv6 network includes:
- an interaction message obtaining unit adapted to obtain a signaling message sent by a mobile node (MN) to an active HA/MAP and the signaling message sent by the active HA/MAP to the MN;
- an interaction message sending unit adapted to send in real time the obtained signaling message to a standby HA/MAP.
- interaction message obtaining unit and the interaction message sending unit are set in an outer switch located outside each outer link interface.
- the apparatus further includes an interaction message processing unit set in an HA/MAP and adapted to process the signaling message from the interaction message sending unit when the HA/MAP is in a backup status.
- the interaction message processing unit includes a binding update message processing unit and an IP security message processing unit.
- the binding update message processing unit is adapted to establish a new record in a backup database according to an obtained binding update request sent by the MN, mark the record as temporarily unusable, and mark the record as usable or update the record according to an obtained binding update acknowledgement message sent by the active HA/MAP.
- the IP security message processing unit is adapted to analyze an obtained IP security message between the active HA/MAP and the MN to keep real-time synchronization with a sending serial number and a receiving slip window of the active HA/MAP.
- the apparatus further includes:
- a batch backup request unit set in the HA/MAP and adapted to send a batch backup request for the HA/MAP when an invalid active HA/MAP resumes and is elected as the standby HA/MAP;
- a backup response unit set in the HA/MAP and adapted to send a backup response to respond the batch backup request for a current active HA/MAP;
- a backup response processing unit set in the HA/MAP and adapted to obtain index information after receiving the backup response and inform the batch backup request unit to send a re-batch backup request carrying the index information of the backup information needing to download;
- a backup information sending unit set in the HA/MAP and adapted to send the backup information when the current active HA/MAP has received the re-batch backup request.
- the disclosure makes the service information between the standby HA/MAP and the active HA/MAP real-time synchronous by the standby HA/MAP obtaining in real time the message interacted between the active HA/MAP and the MN or by the active HA/MAP sending in real time the backup information to the standby HA/MAP. Therefore, when the active HA/MAP is invalid, the standby HA/MAP may take over the work in real time, which ensures the stability of the active node devices in the network and minimally reduces the influence on the network operation by the single-point trouble.
- the batch backup between the standby HA/MAP and the active HA/MAP is realized.
- the present scheme ensures the smooth transmission of the service and makes the foreign and local MNs not to feel the change of the service flow.
- FIG. 1 is a schematic diagram illustrating the scheme of the basic network organization in accordance with an embodiment of the disclosure
- FIG. 2 is a schematic diagram illustrating the real-time backup in accordance with an embodiment of the disclosure
- FIG. 3 is a schematic diagram illustrating that the standby HA/MAP obtaining in real time the signaling message in accordance with an embodiment of the disclosure
- FIG. 4 is a schematic diagram illustrating the batch backup in accordance with an embodiment of the disclosure.
- FIG. 5 is a block diagram illustrating the backup apparatus in accordance with an embodiment of the disclosure.
- one embodiment of the backup system in accordance with the disclosure is applied in the mobile IPv6 network.
- HA/MAP 121 , 122 and 123 form a redundant backup group.
- the HA/MAP 121 , 122 and 123 elect HA/MAP 121 as an active HA/MAP and the HA/MAP 122 , 123 as a standby HA/MAP.
- the HA/MAP 122 , 123 in backup status obtain in real time the message sent by the MN 110 to the active HA/MAP 121 and the message sent by the active HA/MAP 121 to the MN 110 and process the message; or when the active HA/MAP 121 performs message interaction with the MN 110 , the active HA/MAP 121 synchronizes in real time the status information to the HA/MAP 122 , 123 in the backup status by a synchronization message.
- FIG. 2 is a schematic diagram illustrating the real-time backup in accordance with the embodiment of the standby Method in the disclosure
- the real-time backup process includes the following steps.
- Step S 21 On the home link of the MN, a plurality of HAs/MAPs forms the redundant backup group.
- Each HA/MAP elects the active HA/MAP by the VRRP protocol or a similar priority election protocol.
- the active HA/MAP communicates with an outer network by a virtual IPv6 address and a virtual medium access control address.
- the HA/MAP may share the global routable IP address to outside.
- the HA/MAP in the backup status obtains in real time the message sent by the MN to the active HA/MAP and the message sent by the active HA/MAP to the MN, calculates the message, processes the message, and stores the result.
- the specific process for obtaining in real time the message and processing the message includes following steps.
- the configuration of the active HA/MAP is the same as the configuration of the standby HA/MAP, i.e. the security policy databases (SPD) of the active HA/MAP and the standby HA/MAP are the same. If the active HA/MAP and the standby HA/MAP establish the security association manually, the security association databases (SADB) of the active HA/MAP and the standby HA/MAP are also the same.
- SPD security policy databases
- SADB security association databases
- the security association status (IKE/IPSec status) needs to be backuped to the standby HA/MAP (Step S 24 ). Meanwhile, the index relationship between the security policy database SPD and the security association also needs to be backuped.
- the active HA/MAP may backup the established IKE/IPSec status to the standby HA/MAP by the synchronization message.
- the standby Message used may be an expanding message of the VRRP for IPv6.
- the active HA/MAP may backup the established IKE/IPSec status to the standby HA/MAP by the synchronization message.
- the specific process is as follows.
- the active HA/MAP may synchronize the status of the first phase (including the DH exchanging public values, initiating the nonce and so on) of the IKE to the standby HA/MAP.
- the active HA/MAP may synchronize the status of the second phase or the status of the second phase and the first phase of the IKE to the standby HA/MAP.
- the standby HA/MAP also needs to synchronize the sending serial number and the receiving slip window of the key message of the security association of the active HA/MAP.
- the standby HA/MAP keeps synchronization by obtaining and analyzing the mobile signaling message between the active HA/MAP and the MN.
- the standby HA/MAP may perform a security filtering to the received signaling message, i.e. the standby HA/MAP only receives the signaling message between the active HA/MAP and the MN so as to keep synchronization with the sending serial number and the receiving slip window of the key message of the security association of the active HA/MAP.
- each HA/MAP in the backup status may also obtain the message sent by the MN to the active HA/MAP and the message sent by the active HA/MAP to the MN, calculate the binding update message, process the binding update message and stores the result.
- the specific process includes following steps.
- the active HA/MAP When the active HA/MAP has received a binding update request (Step S 25 ), the active HA/MAP sends different binding update acknowledge messages conditionally (Step S 27 ). If the home address created by the MN itself is not included, the active HA/MAP directly sends the binding update acknowledge message to the MN. If the home address created by the MN itself is included, the active HA/MAP needs to examine the home address repeatedly.
- the examination method includes: inquiring a local home link neighbor database, sending a repeat address examination message or inquiring a neighbor agent. If the repeat address examination is passed, the active HA/MAP directly sends the binding update acknowledge message to the MN. If the repeat address examination is not passed, the suggested home address needs to be included in the binding update acknowledge.
- the standby HA/MAP After obtaining the binding update request (Step S 26 ), the standby HA/MAP establishes a new record in the backup database and marks the record as temporarily unusable; and then marks the record as usable or updating the record according to the obtained binding update acknowledge message sent by the active HA/MAP (Step S 28 ).
- the standby HA/MAP marks the new record in the database as usable.
- the standby HA/MAP adds the allocated home address into the new record in the database.
- the standby HA/MAP updates the new record in the database to the suggested home address.
- the active HA/MAP may also directly send the binding cache information to the standby HA/MAP.
- the standby HA/MAP may obtain the signaling message between the active HA/MAP and the MN by establishing a backup information channel.
- One embodiment of the backup information channel is shown in FIG. 3 .
- the backup information channel is established between each outer link interface 130 using the VRRP protocol.
- the signaling message sent by MN 110 to active HA/MAP 121 and the binding update message are copied by the switch 140 of the outer link to the standby HA/MAP 122 , 123 . Meanwhile, the signaling message sent by the active HA/MAP 121 to the MN 110 and the binding update message are also copied by the switch 140 of the outer link to the standby HA/MAP 122 , 123 .
- the standby HA/MAP elects a new active HA/MAP to take over the work of the active HA/MAP and act as the new active HA/MAP (Step S 30 ).
- the active HA/MAP may be invalid because of exception errors or maintaining requirement.
- a previous active HA/MAP resumes it may be elected as a new standby HA/MAP by the VRRP protocol.
- the HA/MAP has no information recorded in the security policy database, in the security association database and in the binding update database. The information needs to be obtained from the current active HA/MAP for completing the backup work.
- the previous active HA/MAP is the owner of the virtual IPv6 address, the previous active HA/MAP may be elected as a new active HA/MAP only after downloading the backup information in batch-bulk from the current active HA/MAP.
- FIG. 4 is a schematic diagram illustrating that the standby HA/MAP backups the message information of the current active HA/MAP in batch-bulk.
- the process of batch backup includes following steps.
- Step S 41 When the previous active HA/MAP resumes, the previous active HA/MAP is elected as the new standby HA/MAP by the VRRP protocol.
- the standby HA/MAP initiates a batch backup request to the active HA/MAP;
- Step S 42 When the active HA/MAP receives the batch backup request sent by the standby HA/MAP, the active HA/MAP sends a backup response.
- the specific process includes as follows.
- the active HA/MAP determines whether the standby HA/MAP carries the index of the backup information needed. If the standby HA/MAP carries the index of the backup information needed, the current active HA/MAP sends the backup response carrying the security policy database, the security association database, the status information of the Internet key exchange and the index information of the binding update needed by the standby HA/MAP. When the batch backup request sent by the HA/MAP does not include the backup information needed, the current active HA/MAP sends the backup response carrying the current security policy database, the security association database, the status information of the Internet key exchange and the index information of the binding update to the HA/MAP.
- Step S 43 When the HA/MAP receives the response of the current active HA/MAP, the HA/MAP determines to download security policy database, the security association database, the status information of the Internet key exchange and the index information of the binding update according to its own need and re-sends a batch backup request to the current active HA/MAP.
- Step S 44 According to the re-received download request, the current active HA/MAP sends the backup information to the standby HA/MAP.
- the standby HA/MAP After completing the batch backup, the standby HA/MAP enters the real-time backup status.
- FIG. 5 it is a block diagram illustrating the backup apparatus of the HA/MAP in accordance with an embodiment of the disclosure.
- the backup apparatus includes: an interaction message obtaining unit 510 adapted to obtain the signaling message sent by the MN to the active HA/MAP and the signaling message sent by the active HA/MAP to the MN; and an interaction message sending unit 520 adapted to send in real time the obtained signaling message to the standby HA/MAP.
- the interaction message obtaining unit 510 and the interaction message sending unit 520 are set in the outer switch 600 located outside each outer link interface.
- the backup apparatus further includes an interaction message processing unit 530 set in the HA/MAP adapted to process the signaling message from the interaction message sending unit 520 when the HA/MAP is in the backup status.
- the interaction message processing unit 530 includes a binding update message processing unit 531 and an IP security message processing unit 532 .
- the binding update message processing unit 531 is adapted to establish a new record in the backup database according to the obtained binding update request sent by the MN and to mark the record as temporarily unusable; and mark the record as usable or update the record according to the obtained binding update acknowledgement message sent by the active HA/MAP.
- the IP security message processing unit 532 is adapted to analyze the obtained IP security message between the active HA/MAP and the MN to keep real-time synchronization with the sending serial number and the receiving slip window of the active HA/MAP.
- an invalid previous active HA/MAP may be elected as a new standby HA/MAP by the VRRP protocol.
- the HA/MAP has no information recorded in the security policy database, in the security association database and in the binding update database.
- the previous active HA/MAP may be elected as a new active HA/MAP only after downloading the backup information from the current active HA/MAP in batch-bulk.
- the backup apparatus further includes:
- a batch backup request unit 540 set in the HA/MAP and adapted to send a batch backup request for the HA/MAP when the invalid active HA/MAP resumes and is elected as the standby HA/MAP;
- a backup response unit 550 set in the HA/MAP and adapted to send a backup response to respond the batch backup request for the current active HA/MAP;
- a backup response processing unit 560 set in the HA/MAP and adapted to obtain the index information after receiving the backup response and inform the batch backup request unit 540 to send a re-batch backup request carrying the index information of backup information needing to be downloaded;
- a backup information sending unit 570 set in the HA/MAP and adapted to send the backup information when the current active HA/MAP received the re-batch backup request.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Photoreceptors In Electrophotography (AREA)
- Control By Computers (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (9)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200510100196 | 2005-10-01 | ||
CN200510100196.2A CN1941769B (en) | 2005-10-01 | 2005-10-01 | Method for agenting or duplicating mobile resident point in mobile IPv6 network |
CN200510100196.2 | 2005-10-01 | ||
PCT/CN2006/002586 WO2007038900A1 (en) | 2005-10-01 | 2006-09-29 | Method, system and device for backing up ha/map in mobile ipv6 network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2006/002586 Continuation WO2007038900A1 (en) | 2005-10-01 | 2006-09-29 | Method, system and device for backing up ha/map in mobile ipv6 network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080194244A1 US20080194244A1 (en) | 2008-08-14 |
US8085730B2 true US8085730B2 (en) | 2011-12-27 |
Family
ID=37905951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/060,365 Expired - Fee Related US8085730B2 (en) | 2005-10-01 | 2008-04-01 | Method, system and apparatus for backuping HA/MAP in mobile IPV6 network |
Country Status (6)
Country | Link |
---|---|
US (1) | US8085730B2 (en) |
EP (1) | EP1944983B1 (en) |
CN (1) | CN1941769B (en) |
AT (1) | ATE463118T1 (en) |
DE (1) | DE602006013340D1 (en) |
WO (1) | WO2007038900A1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1941769B (en) | 2005-10-01 | 2010-07-07 | 华为技术有限公司 | Method for agenting or duplicating mobile resident point in mobile IPv6 network |
CN101854619A (en) * | 2009-03-31 | 2010-10-06 | 华为技术有限公司 | Method for taking over failing local mobile anchor and network equipment |
CN101562576B (en) * | 2009-05-27 | 2011-11-16 | 杭州华三通信技术有限公司 | Route distribution method and equipment thereof |
US20110075571A1 (en) * | 2009-09-30 | 2011-03-31 | Fang Hao | Distributed virtual home agent for mobile internet protocol |
CN101841462B (en) * | 2010-03-02 | 2012-09-05 | 北京星网锐捷网络技术有限公司 | Method, device and system for informing VRRP state information |
CN102255633B (en) * | 2010-05-20 | 2015-08-12 | 中兴通讯股份有限公司 | A kind of method and system of multi-stand user backup |
US8428024B2 (en) * | 2010-07-21 | 2013-04-23 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for mobility with a split home agent architecture using MPTCP |
US8902734B2 (en) * | 2011-01-31 | 2014-12-02 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for providing communication connection resilience |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6195705B1 (en) * | 1998-06-30 | 2001-02-27 | Cisco Technology, Inc. | Mobile IP mobility agent standby protocol |
CN1402437A (en) | 2001-08-13 | 2003-03-12 | 华为技术有限公司 | Method for implementing increase of radio core network reliability by long-distance backup |
US20030182433A1 (en) * | 2002-02-27 | 2003-09-25 | Cisco Technology, Inc. | Methods and apparatus for mobile IP home agent clustering |
US20040066749A1 (en) * | 2002-09-26 | 2004-04-08 | Naotoshi Watanabe | Routing system |
US6760444B1 (en) * | 1999-01-08 | 2004-07-06 | Cisco Technology, Inc. | Mobile IP authentication |
US20040202126A1 (en) * | 2002-05-06 | 2004-10-14 | Cisco Technology, Inc. | Methods and apparatus for mobile IP dynamic home agent allocation |
JP2004343276A (en) | 2003-05-14 | 2004-12-02 | Fujitsu Ltd | Mobile ip agent apparatus |
CN1568027A (en) | 2003-06-24 | 2005-01-19 | 中兴通讯股份有限公司 | A method of disaster recovery for home location register (HLR) with zero-time service take-over |
US7080151B1 (en) * | 2002-04-01 | 2006-07-18 | Utstarcom, Inc. | Method and system for mobile IP home agent redundancy by using home agent control nodes for managing multiple home agents |
US20070104146A1 (en) * | 2005-11-08 | 2007-05-10 | Mahmood Hossain | Apparatus and methods for home agent resiliency for mobile IPv4 |
US7697501B2 (en) * | 2004-02-06 | 2010-04-13 | Qualcomm Incorporated | Methods and apparatus for separating home agent functionality |
CN1941769B (en) | 2005-10-01 | 2010-07-07 | 华为技术有限公司 | Method for agenting or duplicating mobile resident point in mobile IPv6 network |
-
2005
- 2005-10-01 CN CN200510100196.2A patent/CN1941769B/en not_active Expired - Fee Related
-
2006
- 2006-09-29 EP EP06791172A patent/EP1944983B1/en not_active Not-in-force
- 2006-09-29 DE DE602006013340T patent/DE602006013340D1/en active Active
- 2006-09-29 WO PCT/CN2006/002586 patent/WO2007038900A1/en active Application Filing
- 2006-09-29 AT AT06791172T patent/ATE463118T1/en not_active IP Right Cessation
-
2008
- 2008-04-01 US US12/060,365 patent/US8085730B2/en not_active Expired - Fee Related
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6195705B1 (en) * | 1998-06-30 | 2001-02-27 | Cisco Technology, Inc. | Mobile IP mobility agent standby protocol |
US6760444B1 (en) * | 1999-01-08 | 2004-07-06 | Cisco Technology, Inc. | Mobile IP authentication |
CN1402437A (en) | 2001-08-13 | 2003-03-12 | 华为技术有限公司 | Method for implementing increase of radio core network reliability by long-distance backup |
US20030182433A1 (en) * | 2002-02-27 | 2003-09-25 | Cisco Technology, Inc. | Methods and apparatus for mobile IP home agent clustering |
US7080151B1 (en) * | 2002-04-01 | 2006-07-18 | Utstarcom, Inc. | Method and system for mobile IP home agent redundancy by using home agent control nodes for managing multiple home agents |
US20040202126A1 (en) * | 2002-05-06 | 2004-10-14 | Cisco Technology, Inc. | Methods and apparatus for mobile IP dynamic home agent allocation |
US20040066749A1 (en) * | 2002-09-26 | 2004-04-08 | Naotoshi Watanabe | Routing system |
JP2004343276A (en) | 2003-05-14 | 2004-12-02 | Fujitsu Ltd | Mobile ip agent apparatus |
CN1568027A (en) | 2003-06-24 | 2005-01-19 | 中兴通讯股份有限公司 | A method of disaster recovery for home location register (HLR) with zero-time service take-over |
US7697501B2 (en) * | 2004-02-06 | 2010-04-13 | Qualcomm Incorporated | Methods and apparatus for separating home agent functionality |
CN1941769B (en) | 2005-10-01 | 2010-07-07 | 华为技术有限公司 | Method for agenting or duplicating mobile resident point in mobile IPv6 network |
US20070104146A1 (en) * | 2005-11-08 | 2007-05-10 | Mahmood Hossain | Apparatus and methods for home agent resiliency for mobile IPv4 |
Non-Patent Citations (22)
Title |
---|
1st Office Action in corresponding Chinese Application No. 200510100196.2 (Jun. 5, 2009). |
1st Office Action in corresponding European Application No. 06791172.7 (Feb. 5, 2009). |
Arkko et al., "RFC 3776- Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents," Network Working Group, Jun. 2004, The Internet Society, Reston, Virginia. |
Deng et al., "Reliability and Load Balance among multiple Home Agents draft-deng-mip6-vrrp-homeagent-reliability-00.txt," MIP6/VRRP Working Group, Jul. 11, 2005, The Internet Society, Reston, Virginia. |
Faizan et al., "Problem Statement: Home Agent Reliability draft-jfaizan-mipv6-ha-reliability-01.txt," Mobile IP Working Group, Feb. 2004, The Internet Society, Reston, Virginia. |
Faizan et al., "Virtual Home Agent Reliability Protocol (VHAR) draft-jfaizan-mipv6-vhar-02.txt," Mobile IP Working Group, Apr. 2004, The Internet Society, Reston, Virginia. |
Giaretta et al., "Mobile IPv6 bootstrapping in split scenario draft-ietf-mip6-bootstrapping-split-00.txt," MIP6 WG, Jun. 22, 2005, The Internet Society, Reston, Virginia. |
Haley et al., "Mobility Header Home Agent Switch Message draft-haley-mip6-ha-switch-00.txt," Mobile IPv6, Apr. 2005, The Internet Society, Reston, Virginia. |
Harkins et al., "RFC 2409-The Internet Key Exchange (IKE)," Network Working Group, Nov. 1998, The Internet Society, Reston, Virginia. |
Hinden, "Virtual Router Redundancy Protocol for IPv6," Internet Draft, Sep. 28, 2004, The Internet Society, Reston, Virginia. |
International Search Report in corresponding PCT Application No. PCT/CN2006/002586 (Feb. 8, 2007). |
Johnson et al., "RFC 3775-Mobility Support in IPv6," Network Working Group, Jun. 2004, The Internet Society, Reston, Virginia. |
Kent et al., "RFC 2401-Security Architecture for the Internet Protocol," Network Working Group, Nov. 1998, The Internet Society, Reston, Virginia. |
Kent et al., "RFC 2402-IP Authentication Header," Network Working Group, Nov. 1998, The Internet Society, Reston, Virginia. |
Kent et al., "RFC 2406-IP Encapsulating Security Payload (ESP)," Network Working Group, Nov. 1998, The Internet Society, Reston, Virginia. |
Li et al., "Home Agent Initiated Bootstrap for Mobile IPv6 draft-li-mip6-ha-init-bootstrap-00.txt," MIP6 Working Group, Jul. 11, 2005, The Internet Society, Reston, Virginia. |
Maughan et al., "RFC 2408-Internet Security Association and Key Management Protocol (ISAKMP)," Network Working Group, Nov. 1998, The Internet Society, Reston, Virginia. |
Patel, "Problem Statement for bootstrapping Mobile IPv6 draft-ietf-mip6-bootstrap-ps-03," MIP6, Jul. 14, 2005, The Internet Society, Reston, Virginia. |
Piper, "RFC 2407-The Internet IP Security Domain of Interpretation for ISAKMP," Network Working Group, Nov. 1998, The Internet Society, Reston, Virginia. |
Soliman et al., "RFC 4140-Hierarchical Mobile IPv6 Mobility Management (HMIPv6)," Network Working Group, Aug. 2005, The Internet Society, Reston, Virginia. |
Wakikawa et al., "Inter Home Agents Protocol (HAHA) draft-wakikawa-mip6-nemo-haha-01.txt," MIP6/NEMO Working Group, Feb. 16, 2004, The Internet Society, Reston, Virginia. |
Written Opinion of the International Searching Authority in corresponding PCT Application No. PCT/CN2006/002586 (Feb. 8, 2007). |
Also Published As
Publication number | Publication date |
---|---|
WO2007038900A1 (en) | 2007-04-12 |
CN1941769B (en) | 2010-07-07 |
ATE463118T1 (en) | 2010-04-15 |
US20080194244A1 (en) | 2008-08-14 |
EP1944983A1 (en) | 2008-07-16 |
CN1941769A (en) | 2007-04-04 |
DE602006013340D1 (en) | 2010-05-12 |
EP1944983B1 (en) | 2010-03-31 |
EP1944983A4 (en) | 2008-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8085730B2 (en) | Method, system and apparatus for backuping HA/MAP in mobile IPV6 network | |
JP4188743B2 (en) | Method and associated apparatus for improving accuracy of geographically different agent topologies between heterogeneous access networks | |
US7477894B1 (en) | Methods and apparatus for handling wireless roaming among and across wireless area networks | |
US7586879B2 (en) | Client roaming from a first access node to a second access node within a wireless network | |
US9554316B2 (en) | System and method to provide fast wide-area mobile IP handoffs | |
US7620025B2 (en) | Partner node migration control unit and method | |
JPWO2008078633A1 (en) | Communication system, domain management device, edge device, and mobile terminal | |
US20130275609A1 (en) | Mobility handling in a communication network | |
US8437309B2 (en) | Multihome support method and apparatus | |
JP4453205B2 (en) | Information processing apparatus and method, recording medium, and program | |
WO2008014719A1 (en) | A device and method for carrying out the node roaming in internet protocol version 6 network | |
WO2006103805A1 (en) | Mobile communication system, edge router, mobile management method used in them, program and recording medium | |
JP4652608B2 (en) | Mobile IP data transfer method | |
JP3846625B2 (en) | Data transfer method using mobile IP | |
JP2008541516A (en) | Communication method between IPv6 communicating node and mobile IPv6 node, and communicating node proxy gateway | |
CN101123575B (en) | A multi-host access method, system and device supporting mixed IP | |
JP2004228754A (en) | Mobile management method and mobile communication system | |
US20100067381A1 (en) | Overlay Network Node and Mobile Node | |
KR101037531B1 (en) | Method for providing soft handover using communication state information in wireless internet system | |
JP2003309596A (en) | Mobile communication network system, external agent router, address server and packet delivery method used for the same | |
JP4035823B2 (en) | Mobile IP agent device | |
JP2008160665A (en) | Switching method between heterogeneous communication interfaces, mobile terminal and management device | |
JP4351123B2 (en) | User identifier management method, mobile IP agent, and home agent | |
Haas | Location-independent access in mobile systems | |
Howie et al. | Hybrid model for wireless mobility management using IPv6 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHEN, HONGFEI;ZHANG, JIAN;REEL/FRAME:020878/0473 Effective date: 20080428 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20231227 |